background preloader

Confidentialité et anonymat, pour tous et partout

Confidentialité et anonymat, pour tous et partout

https://tails.boum.org/

Related:  Distributions dédiées à la protection de la vie privéeInternet securitysafetyOnline PrivacyTAILS & TOR

Software Protection Initiative - Lightweight Portable Security 15 June 2011: LPS-Remote Access was certified by AFNIC to connect to the GIG for general telecommuting use Lightweight Portable Security (LPS) creates a secure end node from trusted media on almost any Intel-based computer (PC or Mac). LPS boots a thin Linux operating system from a CD or USB flash stick without mounting a local hard drive. Administrator privileges are not required; nothing is installed. The LPS family was created to address particular use cases: LPS-Public is a safer, general-purpose solution for using web-based applications.

100% Free PPTP and OpenVPN Service Free PPTP VPN $0/mo PPTP (point to point tunneling) is widely used since it is supported across all Microsoft Windows, Linux, Apple, Mobile and PS3 platforms. It is however easier to block and might not work if your ISP or government blocks the protocol. In that case you need to use OpenVPN, which is impossible to detect or block. euro217.vpnbook.com euro214.vpnbook.com us1.vpnbook.com (US VPN - optimized for fast web surfing; no p2p downloading) us2.vpnbook.com (US VPN - optimized for fast web surfing; no p2p downloading) ca1.vpnbook.com (Canada VPN - optimized for fast web surfing; no p2p downloading) de233.vpnbook.com (Germany VPN - optimized for fast web surfing; no p2p downloading) Username: vpnbook Password: VMdc6PJ

Community Tools Static Host Data Collection Tool Crowd Response is a lightweight Windows console application designed to aid in the gathering of system information for incident response and security engagements. The application contains numerous modules, each of them invoked by providing specific command line parameters to the main application. Modules are all built into the main application in C++ language utilizing the Win32 API to achieve their functionality. How to get a personal VPN and why you need one now — Quartz “A computer lets you make more mistakes faster than any other invention with the possible exceptions of handguns and Tequila.” — Mitch Ratcliffe Soon every mistake you’ve ever made online will not only be available to your internet service provider (ISP) — it will be available to any corporation or foreign government who wants to see those mistakes. Thanks to last week’s US Senate decision and yesterday’s House decision, ISPs can sell your entire web browsing history to literally anyone without your permission.

Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA Photo: Josh Valcarcel/WIRED When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. Hack From A Cave - Katana Katana: Portable Multi-Boot Security Suite Last Updated: 11/10/2010 Links Description Katana Katana is a portable multi-boot security suite which brings together many of today's best security distributions and portable applications to run off a single Flash Drive. Tor Browser Bundle Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk. Click Install (3) Wait until the installer finishes.

Safepay - Secure Browser - Wifi Hotspot Security Over the last few years, Internet fraud has increased becoming a serious issue for the online transactions. Bitdefender Safepay™ can be used to protect customers from online frauds, phishing and any other types of attacks targeting sensitive transactions with the purpose of stealing user credentials or money. Using different methods, online thieves can easily access important information like bank accounts and personal data.

How to foil NSA sabotage: use a dead man's switch The more we learn about the breadth and depth of the NSA and GCHQ's programmes of spying on the general public, the more alarming it all becomes. The most recent stories about the deliberate sabotage of security technology are the full stop at the end of a sentence that started on 8 August, when the founder of Lavabit (the privacy oriented email provider used by whistleblower Edward Snowden) abruptly shut down, with its founder, Ladar Levison, obliquely implying that he'd been ordered to secretly subvert his own system to compromise his users' privacy. It doesn't really matter if you trust the "good" spies of America and the UK not to abuse their powers (though even the NSA now admits to routine abuse), you should still be wary of deliberately weakened security.

The Amnesic Incognito Live System GNOME desktop Stream isolation Regular and obfsproxy bridges support KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-) System Requirements: Pentium III compatible processor, 10MB free space on the hard drive. CD-ROM, Floppy Drive or USB flash drive, keyboard, Internet connection (for product download). Compatible BIOS version.Windows system is required for installer to run. USB flash drive is required for the EFI version to work. Disk encryption is not supported. Tablets are not supported.

Download - I2P Dependency Java Runtime 1.6 or higher. (Oracle Java Version 7, OpenJDK 7, or IcedTea7 recommended, except Raspberry Pi: JDK 8 for ARM, PowerPC: IBM SDK 7) Determine your installed Java version here or type java -version at your command prompt. Clean installs USB Dummy Protect, Create Fake Files To Block Viruses Question: How can you protect USB devices like sticks or drives from being infected with computer viruses? Some users are lucky enough to have USB devices that have write protection switches, just like floppy drives had back in the good old days. They just need to pull the switch to write protect their devices. Modern USB devices on the other hand do not ship with write protection switches anymore, which means that other solutions need to be discovered that work equally well. What if you'd fill the storage on the USB device to the brim?

Facebook privacy and kids: Don’t post photos of your kids online Photo by Hemera/Thinkstock I vividly remember the Facebook post. It was my friend’s 5-year-old daughter “Kate,” (a pseudonym) standing outside of her house in a bright yellow bikini, the street address clearly visible behind her on the front door. A caption read “Leaving for our annual Labor Day weekend at the beach,” and beneath it were more than 50 likes and comments from friends—including many “friends” that Kate’s mom barely knew.

Related:  Tor, VPN, Proxy...Operating systemsAnonymat & sécuritédividivitree 1TorOperating24vie sur terre et poitiqueDebian/Ubuntu basedInvisible Computeros